Abstract - With regard to security, the major issue is that most mobile devices are targets that are in line to face attacks. Mobile devices face a range of threats that capitalize on several susceptibilities usually obtained in such devices. Lack of encryptions is a major threat to security of mobile device networks. Information such as text messages and electronic messages that are sent using a mobile device are more often than not unencrypted. Furthermore, numerous mobile device applications lack such encryptions over the networks for transmission and reception and therefore simplify the process of data interception. Malware is an additional problem regarding mobile device networks. It is simple for mobile device users to download malware through games and security patches and also through online advertisements. Consequently, this makes it significantly easy for data interception owing to spyware and Trojans. The lack of security software is also a major issue. Usually, mobile devices lack such software unlike computer devices. Furthermore, users fail to perceive the need for installation. Consequently, this increases the security risk of attacks. What is more, in the event that operating systems might be outdated implies that it is easy for attackers to intercept data using different malware. Performance issues are also a prevalent problem in mobile device networks. For starters, bearing in mind that TCP flow control mechanisms were meant for wired environments, then transitory dilapidations on the air interface of radio access systems might result in pointless deteriorations in performance. There is also the performance problem of latency in mobile networks. This take into account the greater period of time in which it takes a mobile device’s source to send or convey pack of data to a particular receiver. The increased use of internet and increased mobile apps facilitates poor latency.
Index Terms – Mobile Device, Network Security, Performance
I. Introduction
Over the years, the requirements for mobile networks have transformed and shifted from single-purpose networks to multi-purpose networks. A mobile networking system comprises of two or more different kinds of devices running specifically advanced software to maintain, for a period of time, a wireless communication linkage between them. These devices consist of mobile telephone, generally encompass devices based on Code Division Multiple Access (CDMA), Time Division Multiple Access (TDMA), Global System for Mobile Communications (GSM), and Wireless Personal Digital Assistants (WPDA) digital technologies and follow-ons, in addition to satellite telephones and e-mail appliances [1]. Without a doubt, the mobile networking systems have facilitated significant revolution of the world in the present day, dwindling the world that exists between two or more mobile devices. The fast-paced changes and transformations in networking technologies, ground-breaking changes in software, and the development of great influential communication network technologies all have improved communication and brought it to enormous wrappings of the world. Nonetheless, there are major problems linked to mobile devices networking owing to advanced technology [1]. The main objective of this paper is to examine the issues of security and performance as associated to mobile device networking.
II. REVIEW OF LITERATURE
82). Both desktop and Web widgets have the same basic components. Fundamentally, they use Web compatible formats, even if intended to run in a desktop environment. This means that the core of the widget is HTML and CSS code which contains the actual content of the widget, namely text, linked images/video or content pulled from a server of Web service. Alternatively, the widget content can be created using Flash, although
Much work remains to enable a seamless Integration, for example that can extend IP to support mobile network devices. (Chlamtac, Conti, and Liu, 2003) 4G is stated to begin with the assumption "that future networks will be entirely packet-switched, using protocols evolved from those in use in today's Internet." (Chlamtac, Conti, and Liu, 2003) It is reported that a 4G wireless network that is all IP-based "has intrinsic advantages over its
Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which
XML is used not only to represent the data but also as a messaging protocol called SOAP; and (6) Portal Integration is another popular integration methodology in use today. It doesn't involve expensive and time consuming technologies and processes that EAI and data warehousing require. Also, it is the most customer-facing of all the methods described in this section. This means that it can be highly personalized and customized
Wireless Networking Phenomenon Today's world is faced with a myriad of challenging and complex issues that require advanced technological solutions. As technology becomes increasingly user-friendly and focused on the consumer, it is evident that users have become more dependent on wireless technological devices as mechanisms that promote convenience, survival, and economic prosperity. Devices such as cellular phones, laptop computers, and personal digital assistants have become absolute essential components for many consumers
It initially failed to attract the desired audience, but it is believed that the recent innovations of the re-launched tablet PC would ensure its success (Search Mobile Computing, 2010). While Apple stated that they were the first creators of tablet computers, Microsoft comes to argue the same. Thorn Holwerda (2010) however states that neither of the two it monoliths were the creator of tablet PC. "Well, no. They're both wrong.
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now